Shaarli export of all bookmarks on Thu, 08 Mar 18 07:44:20 -0500
- EPIC - SEC Issues Guidance on Cybersecurity Disclosures
- Due Diligence on Cybersecurity Becomes Bigger Factor in M&A - WSJ
- Responding to GDPR pushback: The business case for compliance
- Survey: Health care employees willing to sell confidential data
- 46 Tips To Save You Time, Money, and Trouble (From The 1950’s!) | Budgets Are Sexy
- Addressing Top Health Data Risk Management Mistakes
- HIMSS Speaker Dill on Underutilized Security Technologies
- Malicious Bash Script with Multiple Features - SANS Internet Storm Center
- SMBv1, The Phoenix of Protocols? - /dev/random
- 6 Questions to Ask Your Cloud Provider Right Now
- Essential guidance on achieving and prioritising GDPR compliance – IT Governance Blog
- Free green paper: essential compliance guidance for the NIS Directive – IT Governance Blog
- Generating Scan Reports Using Nmap (Output Scan)
- 7 traits of a valuable DevOps team player | The Enterprisers Project
- 8 Best Tools to Access Remote Linux Desktop
- Insider Threat Seriously Undermining Healthcare ...
- Pragmatic Security: 20 Signs You Are 'Boiling the ...
- Identity Management: Where It Stands, Where It's Going
- Hackers Set New DDoS World Record: 1.7 Tbps
- 3 open source tools for scientific publishing | Opensource.com
- Cybersecurity Gets Added to the M&A Lexicon
- How to automatically scale Kubernetes with Horizontal Pod Autoscaling - Justin W. Flory's Blog
- MAAS for the home | Ubuntu Insights
- Healthcare Experiences Twice the Number of Cyber Attacks As Other Industries | CSO Online
- SecurityBrief Australia - Exclusive Interview: Red Hat on their software-defined storage solution for surveillance
- Host your own email with projectx/os and a Raspberry Pi | Opensource.com
- projectx / os · GitLab
- Cyberspace is the New Battlespace - Lawfare
- BlackBerry's post-phone future includes IoT security
- 4 Ways Small Businesses Can Improve Their Cyber Security Strategies
- How Can You Develop Good Leadership as a Business Owner?
- EFF: Geek Squad has been working with the FBI for a decade
- SQL database engine service startup failure: Troubleshooting Checklist – Don Castelino
- Setting Up HAProxy for a SaaS Application - via @codeship | via @codeship
- Barrier-enabled IO stack for Flash storage | the morning paper
- How CEOs Without College Degrees Got to the Top
- Seth's Blog: Bonnie's rules for being a better client
- 10 Techniques to help you present better | Power BI
- Quantum Computing: Quick Reference Guide – Microsoft Faculty Connection
- Two new GDPR solutions – Modern Workplace – Partner Readiness
- Automatically Generating SQL Server Memory Dumps at a Defined Interval – SQL Meditation
- Recent Changes in my "Learning Tools" Repository - Scott's Weblog - The weblog of an IT pro specializing in cloud computing, virtualization, and networking, all with an open source view
- How to use partclone to create a "smart" partition backup - LinuxConfig.org
- Five Strategies For Surviving A Software Audit - IT Jungle
- Sense/Net - Photoframe
- Almost half of US healthcare organizations breached in the past year
- 1 Terabit DDoS Attacks Become a Reality; Reflecting on Five Years of Reflections
- Carlos Morales
- Happy birthday to us! - Raspberry Pi
- Thermal Camera Diagnoses Thermal Issue on a Sonoff Switch | Hackaday
- Fixing Health IT Security Risks at an Academic Hospital & Trauma Center
- HIMSS 2018 Preview: Security, Business Intelligence & Interoperability
- What is Rancher? Containers in the age of Cattle – Marksei
- DeployHappiness | Remotely Renaming Computers Forever – A PowerShell Adventure
- DSHR's Blog: Archival Media: Not a Good Business
- DSHR's Blog: "Nobody cared about security"
- 9 Useful Electronics Tools Under $13 | Cool Tools
- BPF comes to firewalls [LWN.net]
- Cilium
- Upgrading Your Blade Servers For Free – Blades Made Simple
- International Law and Cyberspace: Evolving Views - Lawfare
- 18c new Lost Write Protection - Blog dbi services
- Practical Lessons on WPF Forms and PowerShell | Alan's Blog
- Preventing DDoS amplification attacks based on memcached - Red Hat Customer Portal
- ToolsWatch.org – The Hackers Arsenal Tools Portal » Prowler v1.6 – AWS Security Assessment and Forensics Tool
- The World's Largest Repository of historical DNS data.
- Policy routing for 'GUEST LAN' » Saved LOG
- Is there a CAP theorem for Durability? - Marc's Blog
- r
- Hyper-V Virtual Machine Backup Utility (Update Version 4.1) – Stick To The Script!
- Value In Automating Processes In ITIL® Framework | Purple Gr...
- 84% of cybersecurity pros are open to switching companies in 2018 - TechRepublic
- How to improve Apache server security by limiting the information it reveals - TechRepublic
- How it Works: Understanding vSAN Architecture Components
- Financial Cyber Threat Sharing Group Phished — Krebs on Security
- Healthcare sector's biggest threats come from insiders, report
- WannaCry hits 12 Connecticut state agencies
- OpenSSH Two Factor Authentication (But Not Service Accounts) · System Overlord
- Cl0neMast3r - Git All Your Favorite Tools In One Click - KitPloit - PenTest Tools for your Security Arsenal ☣
- Two Ways to Get Mapped Drives with WMI | Alan's Blog
- 1.35Tbps: GitHub Faced World's Biggest Ever DDoS Attack
- Complying with NIST Guidelines for Stolen Passwords - Security Boulevard
- Bruce Plante's 'Russian Cyberwarfare' - Security Boulevard
- Securing Healthcare Data and Applications - Security Boulevard
- RIP CERT.org – You Will Be Missed
- Hundreds of Tim Hortons outlets across Canada closed after malware attackSecurity Affairs
- WAScan - Web Application Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- LineageOS 15.1 (Android 8.1.0) for Raspberry Pi 3
- Restic - A Fast, Secure And Efficient Backup Application - OSTechNix
- Misleading Cyber Foes with Deception Technology - ...
- 2018 Privacy Tech Vendor Report
- Passhunt - Tool For Searching Of Default Credentials For Network Devices, Web Applications And More - KitPloit - PenTest Tools for your Security Arsenal ☣
- Bettercap v2.0 - The State Of The Art Network Attack And Monitoring Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
- yakLab Part 1c: Bootstrapping Bifrost with Ansible · Leif Madsen
- yakLab Part 1b: Kickstart File Build Out · Leif Madsen
- yakLab Part 1a: Building the virtual Cobbler deployment · Leif Madsen
- yakLab build out · Leif Madsen
- Create a virtual undercloud with TripleO Quickstart · Leif Madsen
- A Secure Development Approach Pays Off
- Training insurance agents and brokers in cyber risk | CSO Online
- Sizing Up the Role of Deception Technology in Healthcare
- Using a 'Privacy by Design' Approach to GDPR Compliance
- Reminder: Beware of the "Cloud" - SANS Internet Storm Center
- How to manage your workstation configuration with Ansible | Opensource.com
- Nuance says NotPetya attack led to $92 million in lost revenue | CSO Online
- 14 top tools to assess, implement, and maintain GDPR compliance | CSO Online
- Creating virtual machines in libvirt with virt-install · Leif Madsen
- Peanalyzer - Advanced Portable Executable File Analyzer And Disassembler - KitPloit - PenTest Tools for your Security Arsenal ☣
- CALISDO: Threat Modeling for Distributed Designs - Marc's Blog
- Understanding Guide to Mimikatz
- Presentation: Understanding & avoiding AV detection | DiabloHorn
- An introduction to ITIL – IT Governance Blog
- GDPR priorities in the lead up to May – IT Governance Blog
- List of data breaches and cyber attacks in February 2018 – IT Governance Blog
- Consumer group: GDPR will have positive impact worldwide
- A Sneak Peek at the New NIST Cybersecurity ...
- How & Why the Cybersecurity Landscape Is Changing
- What Enterprises Can Learn from Medical Device ...
- Ansible, Part IV: Putting It All Together | Linux Journal
- An Update on Chinese Cybersecurity and the WTO - Lawfare
- Chris's Wiki :: blog/linux/WorkMachine2017
- The Third Generation of Security is Here | CSO Online
- Best security software, 2018: How 5 cutting-edge tools tackle threats | CSO Online
- New Cyber Security Style Guide helps bridge the communication gap | CSO Online
- “Medjacked”: Could Hackers Take Control of Pacemakers and Defibrillators—or Their Data? | The Knowledge Group
- Memcached DDoS – There’s Still Time to Save Your Mind | The Networking Nerd
- Summary: The EU General Data Protection Regulation - Lawfare
- Vulnerability in HPE Integrated Lights-out 2, 3, 4 | Born's Tech and Windows World
- Chris's Wiki :: blog/linux/CheckingRAMDIMMInfo
- Upgrade ESXi 6.0 to 6.5 via command line - JBcomp.com
- iSCSI – target and initiators – Codingbee
- Chris's Wiki :: blog/sysadmin/AutomatingAcmetool
- Chris's Wiki :: blog/tech/MeltdownBadTimeToBuy
- Block Advertising on your Network with Pi-hole and Raspberry Pi | hobo.house
- Chris's Wiki :: blog/linux/ZFSOnLinuxExperienceII
- Stability and evolution together are good signs. They mean that you have a project that is not stagnating and that's well run, and further that people care enough about ZFS on Linux (and use it enough) to bring up important features on it first (in the broad open source world).
- GitHub - f1xpl/openauto: AndroidAuto headunit emulator
- crankshaft: raspberry pi + android auto + free software + love.
- Top 10 open source legal stories that shook 2017 | Opensource.com
- DevOps jobs salaries: 9 statistics to see | The Enterprisers Project
- AI Beats 20 Top US Lawyers, Reads Contracts In 26 Sec With 94% Accuracy
- BAS and Red Teams Will Kill The Pentest - Augusto Barros
- E-Mail Leaves an Evidence Trail - Security Boulevard
- Computer Forensics: FTK Forensic Toolkit Overview
- Secure & Compliant Payment Solutions for Contact Centers | PCI Pal
- The Five Attributes Needed to Succeed at DevSecOps - Security Boulevard
- The 12+ Internet Crime Stories That Make Cybersecurity Measures Essential
- Why it matters?
- IoT hack: how to break a smart home…again - Securelist
- Cloud Computing Basics - Security Boulevard
- Advance Web Application Testing using Burpsuite
- Python Graphing Library, Plotly
- The EU Network and Information Security (NIS) Directive
- Australia’s Mandatory Breach Notification Laws: Time to Predict, Prevent, and Protect - Security Boulevard
- 18c, Cloud First and Cloud Only features: think differently - Blog dbi services
- Lessons From Recent HIPAA Settlements - GovInfoSecurity
- Upgrade to the UEK Release 5 Preview on Oracle Cloud Infrastructure | Oracle Linux Blog
- The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf
- state-of-cybersecurity-report.pdf
- Set up boot method using IPMI - Dell Community
- TripleO: Using the fake_pxe driver with Ironic · Leif Madsen
- Dylan @ His Best: IPMI Upgrade through PXE
- PXE BOOT « LINUX TUTORIAL
- icebreaker - Gets Plaintext Active Directory Credentials If You'Re On The Internal Network - KitPloit - PenTest Tools for your Security Arsenal ☣
- The Dirty Dozen Vendors Deluging Your Vulnerability Management Team - Security Boulevard
- Google Cloud Platform
- Ikigai – Finding Your “Reason For Being” — My Money Blog
- Ipmitool - Kyle's Wiki
- Cyclelicious » vSphere 5 Network PXE install
- Chris's Wiki :: blog/tech/MisleadingAverages
- How to use IPMI and IPMITOOLS » Saved LOG
- Chris's Wiki :: blog/sysadmin/FileserversVsTheCloud
- Dell C6100 BIOS/BMC Configuration | vNetWise
- pxe - How do you add a machine to MAAS with IPMI power using CLI - Ask Ubuntu
- IBM Knowledge Center - I/O tracing using blktrace
- Chris's Wiki :: blog/linux/BlktraceNotes
- Why culture is the most important issue in a DevOps transformation | Opensource.com
- Virtual Institute for I/O [Virtual Institute for I/O]
- Beyond iostat: Storage performance analysis with blktrace - Marc's Blog
- ODA Re-Image Baremetal (12.1.2.12) | EzDBA – BLOG
- Quickly Make Fedora Linux Fonts Glorious | hobo.house
- A slightly more realistic look at lvmcache – The ongoing struggle
- blktrace
- bcache and lvmcache – The ongoing struggle
- Tracking down the lvmcache fix – The ongoing struggle
- Online RegExp Testers | ma.ttwagner.com
- Half a Petabyte in 4U | ma.ttwagner.com
- Counting open files by process | ma.ttwagner.com
- 5 indispensable bash tricks | ma.ttwagner.com
- Stout-basted Toulouse Sausages and Vegetables | hobo.house
- Automate Dell iDRAC Administration with XML | hobo.house
- Secure Cloud Data Backups using Python, Tar and GPG | hobo.house
- Create OpenStack Users the Easy Way | hobo.house
- RDO
- Automated OpenStack Deployments with Foreman and Puppet | hobo.house
- Simple Disk Performance Testing with Linux | hobo.house
- 2.5.2. Tuned-adm - Red Hat Customer Portal
- Remembering Tom Wallis, The System Administrator That Made The World Better | The Changelog
- How to Make Citrus Chicken with Kale | hobo.house
- Creating lots of iSCSI LUNs Quickly on Netapp | hobo.house
- How to Manually Clean Indexes from Elasticsearch | hobo.house
- Back to the Future: Converting a Server VM to Bare Metal | hobo.house
- Trick out your Terminal | hobo.house
- How to Make Killer Lasagna for Eight | hobo.house
- Browbeat Is now an OpenStack Project | hobo.house
- Fun and Profit with Reverse SSH Tunnels and AutoSSH | hobo.house
- Tmux for GNU Screen Refugees and Vim Users | hobo.house
- Automate Infrastructure Docs with Python, WordPress and Foreman | hobo.house
- OpenCPN Official Site
- 7 Underused IPMItool Commands - Postmodern Sysadmin
- Installing Debian by PXE using Supermicro IPMI Serial over LAN – The ongoing struggle
- Bob Metcalfe — The Man (and Lessons) Behind Ethernet, Metcalfe’s Law, and More | The Blog of Author Tim Ferriss
- Automate SuperMicro Server Provisioning or Die Trying | hobo.house
- IPMI trick: Set the boot device | ma.ttwagner.com
- Learning with Texts :: Help/Information
- 10 Basic Cybersecurity Measures - 10_Basic_Cybersecurity_Measures-WaterISAC_June2015_S508C.pdf
- Australian Cyber Security Centre (ACSC)
- Top 4 Mitigation Strategies to Protect Your ICT System: ASD Australian Signals Directorate
- Therac-25 - Wikipedia
- OpenSnitch
- Iridium Browser: A Browser for the Privacy Conscious
- infosecinnovations
- Incident Response Plan - You Need One... - NetWatcher - Cyber Security and Network Monitoring
- Q and A - Script Powershell FileSystemWatcher
- GitHub - glasnt/wail2ban: fail2ban, for windows.
- An Introduction to Cybersecurity - file.html
- Xylok Scanner Xylok Dashboard
- Linked - How Manafort’s inability to convert a PDF file to Word helped prosecutors
- Pledge: OpenBSD’s defensive approach to OS Security
- Another Windows 10 version overview – Red Pill BLOGS
- AWS EFS Windows
- 2017 Was A Nightmare Year For Security
- 7,900 Vulnerabilities In 2017 You Aren’t Aware Of May Put Your Organization At Risk
- The Slow Burn of Meltdown and Spectre: Exploits, Lawsuits, and Perspective
- Electricity Rates and Usage | Electricity Local
- FactsCruncher - Facts For Fun: Easy way to install TK on Strawberry PERL ON WINDOWS!!
- Docker vs CoreOS Rkt
- LeanSentry: IIS Application Monitoring + Diagnostics
- Resources
- media.ccc.de - Sanitizing PCAPs
- Vulnerator
- Creating a culture of change
- The East West Institute's New Report on Encryption: A Review - Lawfare
- IBM's Phil Estes on the Turbulent Waters of Container History
- Linux LAN Routing for Beginners: Part 1 | Linux.com | The source for Linux information
- SAP Offers Three New GDPR Compliance Tools 02/22/2018
- CCNA Training » Basic MPLS Tutorial
- Prevent packages from being updated under Ubuntu / Debian – – Unixblogger –
- How to Record Your Screen Using VLC
- 12 bad enterprise security habits to break | The Enterprisers Project
- Kaspersky Lab v. DHS: The Government's Response and Kaspersky's Reply - Lawfare
- Top 5 Useful VMware ESXi CLI Commands | ESX Virtualization
- 2ine the OS/2 emulator | Fun with virtualization
- Meltdown patch for OpenBSD is available ... let's wait for feedbacksSecurity Affairs
- Cybersecurity - Tips to Protect Small Business from Cyber AttacksSecurity Affairs
- Intel failed to warn US government about Meltdown and Spectre flaws before going public
- vsRisk™
- Spectre and Meltdown Attacks - Security Boulevard
- SSL with WildFly 8 and Undertow
- Configuring SSL in Wildfly 8/9/10 | Real Life Java
- Change Insecure Key To My Own Key On Vagrant
- New Spectre/Meltdown Variants - Schneier on Security
- Embracing the Chaos of Chaos Engineering - via @codeship | via @codeship
- The Ultimate Pre-Install ESXi Host Setup Checklist
- Strategies to realizing Cost Savings in Azure – Girish's Blog – Are you developing ON the cloud?
- Making sense Of Linux namespaces -- Prefetch Technologies
- How To Turn An Extra Phone Into A Complete Hotel Room Security System - foXnoMad
- Health Net Cited for Refusing a Security Audit
- OWASP DependencyCheck - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies - KitPloit - PenTest Tools for your Security Arsenal ☣
- The 5 stages of ITIL – IT Governance Blog
- Annabelle ransomware a horror show for users
- Announcing dbachecks – Configurable PowerShell Validation For Your SQL Instances | SQL DBA with A Beard
- How to Install and Use Netdata Performance Monitoring Tool on Debian 9
- What Is Customer Data Onboarding and Do I Need It in My Business?
- IOS Tips | Nbctcp's Weblog
- How to Choose a Legal Tech Conference to Attend - Law Technology Today
- GDPR 72-Hour Notification
- Getting Started with IoT Security in Healthcare - ...
- How to mitigate rapid cyberattacks such as Petya and WannaCrypt – Microsoft Secure
- Key deadlines for the Scottish Public-Sector Action Plan on cyber resilience – IT Governance Blog
- Troy Hunt: Introducing 306 Million Freely Downloadable Pwned Passwords
- Have I been pwned? Pwned Passwords
- What is a SharePoint architect anyway? – SharePoint Steve
- Notes - Arnold Workout Advice - NevBlog
- US AG creates a new 'Cybersecurity Task Force'
- CIOs Say It Could Become Impossible to Manage Digital Performance as IT Complexity Grows | APMdigest - Application Performance Management
- LMTV LIVE | How to Improve Network Troubleshooting (with Keith Bromley and Bill Coon)
- (6) Keynote: A history of the Internet: Hint, it was not the Bomb - YouTube
- The AI era: 4 skills IT pros need to develop | The Enterprisers Project
- Meltdown, Spectre Likely Just Scratch the Surface ...
- 7 Awesome Open Source Cloud Storage Software For Your Privacy and Security - nixCraft
- L3 routing to the hypervisor with BGP | Vincent Bernat
- | Sys Admin Extraordinaire | » Blog Archive » Job Interview Preparation, Tips and Job Transition Tips
- WS2016 AD upgrade problem: TLS ciphers | House of Windows Blog
- Speeding up TLS: enabling session reuse | Vincent Bernat
- 12 Open Source Cloud Storage Software to Store and Sync Your Data Quickly and Safely
- Death of a middleman: Cloud storage gateways – and their evolution • The Register
- Tools for OSForensics - ImageUSB - Write an image to multiple USB Flash Drives
- OpenIO | Next-Gen Object Storage and Serverless Computing
- Morro Data Announces CloudNAS | StorageReview.com - Storage Reviews
- Documentation – OpenDedup
- Effective medical device user training: Eight steps
- Q&A with Massachusetts AG Maura Healey
- ISAS - Our Services - NHS Information Security, Assurance & Penetration Testing
- Information Systems Engineering Command (USAISEC)
- Crawl coverage and vulnerability detection - Arachni - Web Application Security Scanner Framework
- | Sys Admin Extraordinaire | » Blog Archive » Wireless Networking Workaround On VMware ESXi and Hyper-V Hosts Via DD-WRT Client Bridge Mode On A Linksys WRT54G v5
- Be Aware of These 5 Data Center Trends in 2018
- Digital nomads are hiring and firing their governments | TechCrunch
- GitHub - azsdk/azsdk-docs
- The Emergence of a Cognitive Risk Era: Cognitive Risk Framework | The GRC Bluebook
- A Healthcare Minute: Healthcare Data Security and Systems [Video]
- The Father Of The Internet Sees His Invention Reflected Back Through A 'Black Mirror' : All Tech Considered : NPR
- What is Debian all about, really? Or: friction, packaging complex applications
- DSHR's Blog: Notes from FAST18
- This Game Teaches the History of Cryptography - Motherboard
- Military Industrial Powerpoint Complex : Free Texts : Download & Streaming : Internet Archive
- DVHMA - Damn Vulnerable Hybrid Mobile App (For Android) That Intentionally Contains Vulnerabilities - KitPloit - PenTest Tools for your Security Arsenal ☣
- Top 10 Operational Responses to the GDPR – Part 4: Data protection impact assessments and data protection by default and by design
- Vulnerabilities Broke Records Yet Again in 2017
- Meltdown/Spectre: The First Large-Scale Example of ...
- Benchmarking Amazon EC2 Instances vs. Various Intel/AMD CPUs (February 2018) - Phoronix
- One command database upgrade on ODA - Blog dbi services
- Chroot: the magical healing powers of the original Linux virtualization tool
- Linux command history: Choosing what to remember and how | Network World
- Dr. Mine - Tool To Aid Automatic Detection Of In-Browser Cryptojacking - KitPloit - PenTest Tools for your Security Arsenal ☣
- Strategy Series: Build vs. Buy (sorta) - The Forwarding Plane | The Forwarding Plane
- Deleting an archive from Glacier though the AWS CLI | viktorious.nl – Virtualization & Cloud Management
- How to Copy File Permissions and Ownership to Another File in Linux
- Efficient Ways To Read The Log Files In Linux | 2daygeek.com
- iTWire - Data breach law takes effect on Thursday
- Ansible, Part III: Playbooks | Linux Journal
- OpenRA - Home
- Duplicati Monitoring - dashboard and e-mail reports for Duplicati
- Announcing dupReport - A Duplicati Email Report Summary Generator - Duplicati
- Windows+Registry+Auditing+Cheat+Sheet+ver+1.1+Jan+2016.pdf
- SYS.USER$ table in Oracle – last password change time, last locked, last expired, creation time, failed logon | DBAORA
- List of default database users - Oracle FAQ
- How to generate an SSH key pair in Linux?
- SSH keys - ArchWiki
- A surprising way to win in a crashing crypto market
- Account Status within a Oracle RDBMS | Catt Solutions
- State of Salaries Report - Hired
- HODL on for Dear Life: The history and meaning of ‘HODL’ | The Litecoin Community Alliance
- Medical Device Security Update: Why the MDS2 Form was Revised | Symantec Connect Community
- Acquire Enterprise Mission Assurance Support Service (eMASS)
- LKRG: Linux to Get a Loadable Kernel Module for Runtime Integrity Checking
- VMSA-2018-0007.1 | United States
- Tunna - Set Of Tools Which Will Wrap And Tunnel Any TCP Communication Over HTTP - KitPloit - PenTest Tools for your Security Arsenal ☣
- Fujifilm Slots Tape into Cloud Backups -- InfoStor
- Cloud Storage – ever considered LTFS Tape?? (Storageneers)
- Etcher
- Learn, Acquire, then Apply… » Blog Archive » How to run SysPrep on an Upgraded Operating System
- GitHub - Srinivas11789/PcapXray: PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
- Germany defense minister: Cybersecurity is going to be the main focus of this decadeSecurity Affairs
- LMMS Guide Part 1: Creating Simple Melodies Using Sounds And Instruments
- Open-Source Object Storage. Comparison of Solutions
- X12 EDI file generation | Tallan's Technology Blog
- How To Talk With Kids About Terrible Things : NPR Ed : NPR
- Brendan Tierney - Oralytics Blog: 18c is now available (but only on the Cloud)
- Culture of Quality: Measuring Code Coverage at Etsy - Code as Craft
- GDPR and Data Storage Compliance
- GDPR and Data Storage Compliance
- Selling Remote Backup Service - 6 Helpful Tips
- Infrastructure as Code – Microsoft MVP Award Program Blog
- Administrator vs. Standard: Which User Account Should You Use in Windows?
- Amazon S3 Logging - Enabling and Reading Amazon S3 Logs
- Best Online Backup Service: 5 Questions That Need to Be Answered
- 7 Things You Need to Know about LTFS | SBDS
- LTFS Tape-Disk Hybrid Storage: Who Needs Cloud? - EnterpriseStorageForum.com
- RDP Cache Forensics – Cyber Forensicator
- Three Ways to Take Home the Gold When It Comes to Cybersecurity at the Olympics
- ReelPhish - A Real-Time Two-Factor Phishing Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Cyber resilience for the modern enterprise – Microsoft Secure
- NBlog - the NoticeBored blog: NBlog February 17 - The I part of CIA
- What Does 'Sheep Dip' Mean in Cyber Security? | OPSWAT Blog
- Windows Analytics now includes Meltdown and Spectre detectorSecurity Affairs
- NOC/SOC Integration: Opportunities for Increased Efficiency in Incident Response within Cyber-Security - noc-soc-integration-opportunities-increased-efficiency-incident-response-cyber-security-38290
- A Performance Evaluation of Storage and Retrieval of DICOM Image Content - ora-dicom-bench-2008-129543.pdf
- Pymap-Scanner - Python Scanner with GUI - KitPloit - PenTest Tools for your Security Arsenal ☣
- Pymap-Scanner
- How to avoid duplication when implementing an ISO 27001 ISMS – IT Governance Blog
- Align your cyber resilience strategy with government best practice – IT Governance Blog
- The key elements of data flow mapping under the EU GDPR – IT Governance Blog
- APTSimulator - A toolset to make a system look as if it was the victim of an APT attack - KitPloit - PenTest Tools for your Security Arsenal ☣
- Elk + Osquery + Kolide Fleet = Love – JP
- How to implement ISO 27001 into your SME quickly and easily – IT Governance Blog
- Raspberry Pi: Phoning home using a reverse remote ssh tunnel - TunnelsUP
- Remote Monitoring and Management Software | ConnectWise Automate
- Leading IT Business Management Software | Autotask
- SnowMirror | The Smart Data Replication Tool for ServiceNow
- rsync.net Enterprise Cloud Storage
- The preparations you need to make ahead of GDPR
- Cyber security in (big) numbers
- Service Provider Security Solutions - Endpoint Security Solutions for MSSPs - Cisco
- Windows 10 compatibility issues forcing US Air Force to scrap a significant number of computers
- FreeNAS ZFS snapshot backup to Amazon S3 - Mourtada.se
- VCDX181.com - Introducing VMware NSX-T Reference Design
- A first look at AWS Greengrass on vSphere - CormacHogan.com
- 5 Reasons You Need to Start Using Containers Now -- Virtualization Review
- GitHub - duplicati/duplicati: Store securely encrypted backups in the cloud!
- *Updated* Pricing for Flash/Hybrid, Hyper Converged, SAN/NAS solutions
- Top 10 Operational Responses to the GDPR – Part 3: Build and maintain a data governance system
- Implementing the CNIL’s GDPR Prep
- New Hack Can Steal Data From Devices in Faraday Cages - Motherboard
- 10 Cyber Security Decisions You (and Me) Will Regret in The Future
- Threat Risk Modeling - OWASP
- GitHub - deptofdefense/code.mil: An experiment in open source
- JVM Monitoring and Performance Assurance for Java-Based Banking and Trading Applications | APMdigest - Application Performance Management
- 5 Reasons to fall in Love with ITIL | Purple Griffon
- CPUs: Cores versus Threads on an Oracle Server - Blog dbi services
- EzPi4ME - Getting rid of the Intel ME, for mere mortals – The Pensieve
- PowerShell: Creating Domains and Domain Controllers | PeteNetLive
- 11 awesome vi tips and tricks | Opensource.com
- Japan's young shogi star Fujii beats highest title holder Habu - Japan Today
- Cyber attacks reportedly cost the US as much as $109 billion in 2016
- Container security fundamentals: 5 things to know | The Enterprisers Project
- Policy-based routing on Linux to forward packets from a subnet or process through a VPN | stewart a.
- SQL Server Management Studio 17.4: Vulnerability Assessment - Blog dbi services
- Real-time Linux based automation controller supports up to 16 I/O modules
- Add-on board brings BACnet building control to the Raspberry Pi
- Check Linux Distribution Name and Version | 2daygeek.com
- Meltdown, Spectre and Ubuntu: What you need to know | Ubuntu Insights
- Install OpenStack on Ubuntu | Linux Hint
- Virtualizing GPU Access
- Arch Anywhere is Dead – Long Live Anarchy - OSRadar
- NHS Digital release GDPR guidance for health and social care – IT Governance Blog
- ZFS vs. OpenZFS
- HolisticInfoSec™: toolsmith #131 - The HELK vs APTSimulator - Part 1
- General Data Protection Regulation (GDPR) guidance - NHS Digital
- How to clone a Dell Optiplex 7050 M.2 NVME Hard Drive with Clonezilla and an External USB HDD – jasoncoltrin.com
- Google Dorks List 2018 For Ethical Hacking and Penetration Testing
- The Importance of a Growth Mindset in a Technology First World – Nicole Welch
- DSC Resource Kit Release February 2018 | PowerShell Team Blog
- Active Directory Passwords – Who is Right? – The Personal Blog of Sean Goodwin
- The best Linux distro for gaming in 2018 | TechRadar
- How to fix loose outlets - The Silicon Underground
- Vulnerability management best practices - The Silicon Underground
- Email Reminders for PowerShell Tasks
- Rules for Radicals - Wikipedia
- Seth's Blog: Reversing Alinsky's rules
- A Healthcare Minute: Why Interoperability Is Crucial
- Running Systems » Blog Archive » Oracle important patches
- We need fewer ITSM processes » Optimal Service Management
- ITIL processes aren't processes | The IT Skeptic
- Get started with KVM & Kubernetes
- Introduction to Quantum Computing – Microsoft Faculty Connection
- SQL Updates Newsletter – January 2018 – SQL Server Updates and Lessons Learned
- Problems With Your Raspberry Pi? Try These 4 Fixes
- Spectre and Meltdown attack explained, simply, for non-programmers – The Pensieve
- ID-entify - Search for information related to a domain (Emails, Domains, Information on WEB technology, Type of Firewall, NS and MX records) - KitPloit - PenTest Tools for your Security Arsenal ☣
- U.S. GAO - Cybersecurity Workforce: Urgent Need for DHS to Take Actions to Identify Its Position and Critical Skill Requirements
- DSHR's Blog: DNA's Niche in the Storage Market
- FOSDEM - video recordings
- Using Terraform taint and Kubernetes cordon To rebuild nodes with no service interruption -- Prefetch Technologies
- Creating Kubernetes pods with your favorite OS to test new features -- Prefetch Technologies
- Researchers ported the NSA EternalSynergy, EternalRomance, and EternalChampion to Metasploit - Security AffairsSecurity Affairs
- How to configure a Mikrotik router as DHCP-PD Client (Prefix delegation) | Robert Penz Blog
- Can You Spot the Social Engineering Techniques in a Phishing Email? | OPSWAT Blog
- Zero-K
- Equifax breach may have exposed more data than first thought
- Grouper - A PowerShell script for helping to find vulnerable settings in AD Group Policy - KitPloit - PenTest Tools for your Security Arsenal ☣
- Centralized Firewall Control script
- Developing an effective cyber strategy – Microsoft Secure
- Overview of Petya, a rapid cyberattack – Microsoft Secure
- Six Ways IT Service Providers Can Protect Their Clients from Ransomware
- Massachusetts attorney general adds online data breach report portal
- BLEAH - A BLE Scanner For "Smart" Devices Hacking - KitPloit - PenTest Tools for your Security Arsenal ☣
- Every NHS Trust assessed for cyber resilience has failed on-site assessment – IT Governance Blog
- What documentation do I need to achieve cyber resilience? – IT Governance Blog
- 5 ways ITIL can benefit your organisation – IT Governance Blog
- How to write a GDPR data protection policy – IT Governance Blog
- Think GDPR Won’t Affect Your U.S. Company? Guess Again
- The GDPR: Your best friend (but you know that)
- 50+ Useful Cyber Security Online Courses You Should Explore [Updated]
- Hospital Hit With Cryptocurrency Mining Malware
- Partners HealthCare Breach: Why So Long to Confirm?
- Apple, Cisco Strike Partnerships for Cyber Insurance
- Beginner Guide to IPtables
- Payload Processing Rule in Burp suite (Part 2)
- Engagement Tools Tutorial in Burp suite
- Tennessee Hospital Hit With Cryptocurrency Mining ...
- Ticking Time Bombs in Your Data Center
- Windows Server - Service not starting with 'Error 1067: The process terminated unexpectedly' - Blog dbi services
- Dark Side Ops I & 2 Review Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
- Ansible - Generating Inventory From DNSMasq Leases - EverythingShouldBeVirtual
- UQDS: A software-development process that puts quality first | Opensource.com
- Hey DBA, fix it, but don't touch it! | The ORACLE-BASE Blog
- New open source platform offers secure, self-hosted collaboration
- Hard Olympic Security Choices: What to Watch for in Pyeongchang - Lawfare
- Add a New AWS Account to an Existing Organization from the CLI - The IT Hollow
- The Cuckoo’s Egg Decompiled Online Course – Chris Sanders
- Turn Any CLI into a Function with OpenFaaS
- AG Healey Launches Online Portal for Data Breach Reports | Massachusetts News | US News
- Stacer - Linux System Optimizer and Monitoring - KitPloit - PenTest Tools for your Security Arsenal ☣
- First look at the new DSP Toolkit shows additional requirements for healthcare organisations – IT Governance Blog
- Mastering Security in the Zettabyte Era
- Managing ‘Shadow IT’ Risks in Healthcare Settings
- Prevent Files And Folders From Accidental Deletion Or Modification In Linux - OSTechNix
- Jon Masters On Understanding Spectre & Meltdown CPU Vulnerabilities - Phoronix
- GDPR – Six key stages of the data protection impact assessment (DPIA) – IT Governance Blog
- Rise in cyber attacks leads to cyber insurance business soaring – IT Governance Blog
- Tutorial: Use personal gmail with @yourdomain.com
- Meltdown/Spectre Status for Red Hat and Oracle | Linux Journal
- CapAnalysis | PCAP from another point of view
- Importing OVA container into Proxmox (Step-by-Step) ~ Binary Heartbeat
- Azure Governance - Eric’s Azure Blog
- Unattended installation of VM images with Packer
- Healthcare Reference Checking Software
- Microsoft Word - GDPR Checklist for Third Party Agreements _Final_.docx - GDPR-Checklist-for-Third-Party-Agreements__Final_.pdf
- Using s3cmd and other Amazon S3-compatible apps with Azure Blob Storage | Microsoft + Open Source
- Logjam: PFS Deployment Guide
- Steps to GDPR Compliance: Vendor Management - EMEA Blog
- SSL Hardening of Wildlfy 8.2 Undertow – Vijay Konnackal
- An Introduction to GDPR: Why Third Party Security Will Be Critical
- Important information about Microsoft Meltdown CPU security fixes, antivirus vendors and you
- Cleveland Clinic names Ed Marx new chief information officer | Healthcare IT News
- dokuhebi (Tom Albrecht) · GitHub
- Benefits of cloud computing | IBM Cloud
- Download Windows 10 Enterprise (1709, 16299) ISO x64 / x86 Free via Official Links
- Who’s behind Amazon in IaaS cloud revenue? Not Microsoft - TechWorld
- Scanning firewalls for differences in IPv4 and IPv6 rules | Sebastian Neef - 0day.work
- Healthcare IT Systems: Tempting Targets for Ransomware - IEEE Spectrum
- What's new in SQL Server 2017 presentation | James Serra's Blog
- Data Virtualization vs Data Warehouse | James Serra's Blog
- Using a Yubikey for GPG and SSH | Sebastian Neef - 0day.work
- Don't format, overwrite before you sell! - Recovering data from 2nd hand HDDs | Sebastian Neef - 0day.work
- Writing my first shellcode - iptables -P INPUT ACCEPT | Sebastian Neef - 0day.work
- Reference architecture for enterprise reporting in Azure | James Serra's Blog
- Is the traditional data warehouse dead? | James Serra's Blog
- Azure Backup Calculator: Estimate Your Monthly Backup Costs - Agile IT
- Cloudyn: Cloud Management Platform & Cloud Cost Optimization Tool
- Healthcare Exchange Standards: Apple should have a HEART
- Grey-collar - Wikipedia
- FFIEC Cybersecurity Awareness
- FY16-UW-GBY---IT-Strategic-Plan-2014-17-DK.pdf
- Experimental Amazon S3 API support for Backblaze B2 Cloud Storage Service
- Network Diagram: An Important Tool for Effective Time Management
- 43.7. SELinux Policy Overview
- Troubleshooting SELinux Issues on CentOS and Red Hat - Serverlab
- SELinux/Tutorials/How is the policy provided and loaded - Gentoo Wiki
- PCI DSS and the Network Diagram
- Network Diagrams: Drawing Overlay Network Layers — EtherealMind
- SELinux/Tutorials/Creating your own policy module file - Gentoo Wiki
- The Global Consciousness Project
- Postman | API Development Environment
- CSA Guidance V2.16 - csaguide.pdf
- Three ways to align security programs to enterprise strategy | CSO Online
- Alternatives to Bastille Linux: system hardening with Lynis
- The 5 Best Free MP3 Tag Editors
- Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices - 1801.05583.pdf
- An Unofficial Raspberry Pi Blog: How to Setup Remote Desktop from a Windows Machine to your Raspberry Pi - Step by Step Guide
- Pricing - Remote device management
- Raspberry Pi + Apache - MitchTech | MitchTech
- remote device management, even over cellular data connections
- Who's in the Zone? A Qualitative Proof-of-Concept for Improving Remote Access Least-Privilege in ICS-SCADA Environments - zone-qualitative-proof-of-concept-improving-remote-access-least-privilege-ics-scada-environments-38205
- Cyber Hygiene.pdf
- Microsoft Word - CYBER HYGIENE.docx - Cyber-Hygiene.pdf
- Cybercrimelaw
- Recovering from rm -rf on a datafile | Raheel's Blog
- Medical Imaging Devices Are Vulnerable To Cyber-Attacks - Information Security Buzz
- BSIMM8 Study Reinforces Benchmarking as a Critical Exercise in Early Stages of Software Security
- Five steps to GDPR compliance - Help Net Security
- Consensus Assessments Initiative Questionnaire v3.0.1 (9-1-17 Update) - Cloud Security Alliance : Cloud Security Alliance
- Cyber Security Lectures by Mateti
- Pro Tip: PowerShell DSC Events to Monitor – GoateePFE
- PowerShell Desired State Configuration: The Basics - Simple Talk
- The 11 most difficult IT hires today | CIO
- Provide Cross Region Low-latency Service based on Azure VNET Peering – Wu Shuai's Blog
- Examining Average Student Loan Balances by State – Robert Kelchen
- Setting up a new vSphere Server – Notes from MWhite
- The paradigms of programming | the morning paper
- Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer | the morning paper
- Windows Meltdown and Spectre Patches Impact Rockwell Software Users - The Automation Blog
- BBSs and early Internet access in the 1990ies | Fun with virtualization
- PowerShell for Programmers: What happened to my operators? – Kory Thacher
- Operating System Best Practice Configurations for SQL Server – Don Castelino
- Volunteer Senior Management Committees Part 3 of 3 | People Centre
- Volunteer Senior Management Committees Part 2 of 3 | People Centre
- Volunteer Senior Management Committees Part 1 of 3 | People Centre
- Good engineers – I. M. Wright’s “Hard Code”
- The Windows 10 Link List – PowerInTheShell
- Qwikie Paint Touch Up Kit | Cool Tools
- Donvier Manual Ice Cream Maker | Cool Tools
- What Are Those Hieroglyphics on Your Laptop Charger? | Hackaday
- How I Record My Conference Talks
- An accessible overview of Meltdown and Spectre, Part 1 | Trail of Bits Blog
- How cybersecurity pros can improve their LinkedIn profiles: 4 tips - TechRepublic
- Estimating the Cost of Internet Insecurity - Schneier on Security
- Does Canada Even Have a Huge Piracy Problem? - Motherboard
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure | OPSWAT Blog
- ICMPExfil - Exfiltrate data with ICMP - KitPloit - PenTest Tools for your Security Arsenal ☣
- Evilgrade - Modular Framework To Take Advantage Of Poor Upgrade Implementations By Injecting Fake Updates - KitPloit - PenTest Tools for your Security Arsenal ☣
- RDPY - Remote Desktop Protocol in Twisted Python - KitPloit - PenTest Tools for your Security Arsenal ☣
- PiDense - Monitor Illegal Wireless Network Activities (Fake Access Points) - KitPloit - PenTest Tools for your Security Arsenal ☣
- A major cyber attack is a matter of when, not if – IT Governance Blog
- 5 reasons why business continuity management is essential to your organisation’s cyber security – IT Governance Blog
- NIS Directive consultation feedback published – how to comply – IT Governance Blog
- List of data breaches and cyber attacks in January 2018 – IT Governance Blog
- How to create your PCI DSS charter – IT Governance Blog
- IOActive Labs Research: Security Theater and the Watch Effect in Third-party Assessments
- FBI official highlights importance of SMB cybersecurity
- GDPR will bring 'sea change' to email tracking, website monitoring
- Two paths to meeting GDPR training requirements
- Top 10 operational responses to the GDPR: Data inventory and mapping
- Uber CISO to testify over 2016 data breach
- Publishers need a data opt-out ahead of GDPR
- RSA web con: Breach notification in the GDPR era
- The Five Secrets to Making Security Awareness Work in 2018
- Convert Virtual Machine to Raw Images for Forensics (Qemu-Img)
- Post Exploitation Using WMIC (System Command)
- IoT: Moving to Security by Design - HealthcareInfoSecurity
- Digital Forensics Investigation through OS Forensics (Part 3)
- Digital Forensics Investigation through OS Forensics (Part 2)
- Digital Forensics Investigation using OS Forensics (Part1)
- Allscripts Lawsuit: What Makes It Different? - HealthcareInfoSecurity
- The Unpatched Mind - How to Get Mental Security in A Digital Landscape
- Rationalizing the Security Stack - HealthcareInfoSecurity
- $3.5 Million Penalty for Five Small 2012 Breaches
- How to Delete Root Mails (Mailbox) File in Linux
- It's Time to Make Student Privacy a Priority | Electronic Frontier Foundation
- Third-party Security Questionnaires Are Security Theater
- GDPR keeping you up? There’s another monster hiding under the bed… | CSO Online
- Top 7 open source project management tools for agile teams | Opensource.com
- Healthcare cybersecurity spending to exceed $65B over the next 5 years | CSO Online
- Healthcare’s Secret Weapon for Securing the IoMT | CSO Online
- Is your cloud service provider ready for HIPAA? | CSO Online
- 4 things CISOs should stress to the board of directors about cloud security | CSO Online
- 7 Little-Known Facts About IT Pros | APMdigest - Application Performance Management
- Cisco CCNP SWITCH Topics – neckercube.com
- How to Install Oxidized for Network Configuration Backup – neckercube.com
- Open Source turns 20: Here’s how it all started
- Retrospection and the Future: Still Studying for the CCIE Lab – neckercube.com
- General Network Challenges, and IP/TCP/UDP Operations – neckercube.com